• Title/Summary/Keyword: status information protocol

Search Result 281, Processing Time 0.024 seconds

온라인 인증서 상태 검증 프로토콜(OCSP)의 최근 연구 동향에 관한 분석

  • Kwak, Jin;Lee, Seung-Woo;Cho, Suk-Hyang;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.12 no.2
    • /
    • pp.50-61
    • /
    • 2002
  • 최근 전자상거래의 활성화 및 안전한 네트워크의 구현에 공개키 기반구조의 응용이 확대되면서 공개키의 무결성과 신뢰성을 제공하기 위해 공개키 인증서 상태 검증에 관한 연구가 활발히 진행되고 있다. 본 고에서는 PKI 응용 프로토콜 중에서 인증서의 유효성을 검증하기 위한 온라인 인증서 상태 검증 프로토콜(Outline Certificate Status Protocol)의 최근 연구 동향에 대하여 분석하였으며, 현재 상용화되어 있는 제품들에 대하여 조사하였다. 또한, 특정 인증서에 대한 온라인 취소 상태 확인 서비스(ORS: Online Revocation Status), 인증 경로의 발견을 서버로 위임하는 대리 인증 경로 발견 서비스(DPD: Delegated Path Discovery), 그리고 중앙 집중 서버에게 인증 경로 검증의 기능을 위임하는 대리 인증 경로 검증 서비스(DPV: Delegated Path Validation) 등의 온라인 인증서 상태 검증 프로토콜에서 제공하는 서비스들에 대해서도 살펴보았다. 현재 온라인 인증서 상태 검증 프로토콜(OCSP)에 관한 문서는 IETF에서 표준화한 RFC2560과 2000년 11월과 2001년 3월에 제안된 드래프트가 있으며, 본 고에서는 RFC2560과 제안된 드래프트를 비교 분석하였으며 국내\ulcorner외 제품의 동향과 온라인 인증서 상태 검증 프로토콜의 활용 범위에 대해서 간략하게 살펴보았다.

A Study on the Algorithm Development of End-point Position Tracking for Aerial Work Platform with Bend-linked Boom (굴절링크 붐을 갖는 장비의 끝점 좌표 추적 알고리즘 개발에 대한 연구)

  • Oh, Seok-Hyung;Hong, Yong
    • Journal of Power System Engineering
    • /
    • v.20 no.3
    • /
    • pp.64-73
    • /
    • 2016
  • In this research work, an algorithm development on tracking end-point of aerial work platform with jib profile and bend-linked boom was carried out to find the X, Y and Z direction value using coordinate transformation matrix. This matrix consists of device status value(length and angle) based on camera position axis, which are sent from device controller PLUS+1 by CAN protocol. These values are used to measure the distance and angle from the camera to the end-point. Using these distance and angle value, monitoring system controls FAN/TILT/ZOOM status of camera to get an adequate scene of workplace. This program was written in Java, C# and C for mobile device. These results provide the information to the aerial work device for secure operation.

A Linear Back-off Algorithm for IEEE 802.11 Wireless LAN

  • Cho Chi-woo;Son Jeong-ho;Pak Jin-suk;Son Jae-min;Han Ki-jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.317-320
    • /
    • 2004
  • The exponential back-off algorithm doubles the back-off size after each collision without considering network traffic status, which causes degradation of system performance. In this paper, we propose a linear random back-off mechanism which dynamically selects the back-off window size based on the channel status which includes the number of active stations and collisions to significantly increase the protocol capacity. We present an analytical model for the saturated throughput of our linear random back-off algorithm. Simulation results show that performance can be substantially enhanced if binary exponential back-off algorithm is replaced by a linear back- off algorithm.

  • PDF

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

A High Performance Transmission Method for Massively Delivering Multimedia Data in WMSN (무선 멀티미디어 센서 네트워크(WMSN) 환경에서 멀티미디어 데이터 전송을 위한 대용량 전송 기법에 대한 연구)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.903-917
    • /
    • 2012
  • For transmitting sensed data, wireless sensor networks have been developed and researched for the improvement of energy efficiency, hence, many MAC protocols in WSN employ the duty cycle mechanism. Since the progressed development of the low power transceiver and processor let the high energy efficiency come true, the delivery of the multimedia data which occurs in area of sensor work should be needed to provide supplemental information. In this paper, we design a new scheme for massive transmission of large multimedia data where the duty cycle is used in contention based MAC protocol, for WMSN. The proposed scheme can be applied into the previous duty cycle mechanism because it provides two operation between normal operation and massive transmission operation. Measuring the buffer status of sender and the condition of current radio channel can be criteria for the decision of the above two operations. This paper shows the results of the experiment by performing the simulation. The target protocol of the experiment is X-MAC which is contention based MAC protocol for WSN. And two approaches, both X-MAC which operates only duty cycle and X-MAC which operates combined massive transmission scheme, are used for the comparative experiment.

A Study of NMEA 2000 Protocol Application for Ship Electrical Power Converter Monitoring System (NMEA 2000 프로토콜을 적용한 선박 전력 컨버터 모니터링 시스템에 관한 연구)

  • Hong, Ji-Tae;Park, Dong-Hyun;Yu, Yung-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.35 no.2
    • /
    • pp.288-294
    • /
    • 2011
  • In this paper, the FPGA-based SoC board (Xilinx Virtex-4 ML401 EVM) is adopted to control electrical power inverter system. For marine application, its performance is shown on PC-based system for monitoring electrical characteristics of a power inverter using by the NMEA 2000 protocol. This power inverter system is achieved in Real-Time monitoring and control by dual micro-processor operation on embedded FPGA-based SoC board. One micro processor is for control (Control processor) electrical power inverter using by PWM signal. And the other microprocessor (Communication processor) is for communication with PC-based monitoring system. The two-processor is communicating each other using by dual-port ram (DPRAM). PC-based system user can control and monitor information of the electrical power inverter via NMEA 2000 based communication processor. Control and monitoring information includes the inverter status and configuration. SoC board converts this information to Parameter Group Numbers (PGNs) in the NMEA 2000 protocol. This system can be applied to marine power electronics for distributed power generation, transmission or regulation systems on the ship.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

An Efficient Routing Protocol Considering Path Reliability in Cognitive Radio Ad-hoc Networks (인지 무선 애드혹 네트워크에서 경로 신뢰성을 고려한 효율적인 라우팅 기법)

  • Choi, Jun-Ho;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.730-742
    • /
    • 2014
  • In the case of On-demand routing protocol in cognitive radio ad-hoc networks, broadcasting of control packets may occur common control channel overload and packet collisions during the routing procedure. This situation is to increase the overhead of path finding and also limited to find the accurate and reliable path. Since reliable channel and path finding is restricted, path life time is shorten and path reliability is reduced. In this paper, we propose a new routing algorithm that reduces control channel overhead and increases path life time by considering the probability of appearance of primary user and channel status of neighbor nodes. Each node performs periodic local sensing to detect primary user signal and to derive primary user activity patterns. The probability of primary appearance on the current channel and the channel status can be obtained based on the periodic sensing. In addition, each node identifies the quality of the channel by message exchange through a common channel with neighbor nodes, then determines Link_Levels with neighbor nodes. In the proposed method, the Link Level condition reduces the number of control messages that are generated during the route discovery process. The proposed method can improve path life time by choosing a path through Path_Reliability in which stability and quality are weighted depending on the location. Through simulation, we show that our proposed algorithm reduces packet collisions and increases path life time in comparison with the traditional algorithm.

WPKI Certificate Verification Using Observer (옵저버를 이용한 WPKI 인증서 검증방법)

  • 김진철;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1203-1209
    • /
    • 2004
  • A huge growth the wireless internet services, which are based on the wireless mobile network technology and internet technology, poses demand for the end-to-end secure connections. Restrictions of wireless mobile environment and mobile devices make difficult to adapt present secure protocols to wireless internet services. In this paper, we analyze existing certificate status verification methods in WPKI and propose a new method, adding a observer information in handshake protocol. The method with observer makes it more efficient for relying parties to verify both the current status of the X.509 certificate and the short-lived WTLS server certificate.

Design of Certificate Status Checking Mechanism Using Verification Requester Identity Information (검증 요청자 신원 정보를 이용한 인증서 상태 확인 메커니즘의 설계)

  • Kim, Hyun-Chul;Lee, Jun-Hwan;Han, Myung-Mook;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1257-1260
    • /
    • 2005
  • 인증서 상태 확인은 해당 거래에 사용되는 인증서에 대해 유효한 인증서임을 판별하기 위한 과정으로 인증서 표준이 제정된 이후로 계속적으로 연구되고 있는 분야이다. 현재 가장 보편적으로 이용되는 인증서 상태 확인 기법은 인증서폐지목록(CRL : Certificate Revocation List)을 이용하는 기법이다. 이 기법은 방법 자체가 가지고 있는 시간격차 문제와 물리적 파일 처리의 과부하로 인하여 사용에 많은 제약이 따른다. 이를 해결하기 위해 온라인 인증서 상태 프로토콜(OCSP : OnLine Certificate Status Protocol) 기법이 제시되었다. 이 기법은 CRL 기법의 비 실시간성 문제를 해결한다. 하지만 서비스 요청 서버의 과부하 문제와 구조적 집중화 문제로 인하여 인증서 상태를 확인 하는데 소요되는 시간이 다소 오래 걸린다는 문제가 있다. 본 논문에서는 검증 요청자의 신원정보에 대한 해쉬값을 이용하여 인증서 상태 확인 요청을 하고 이를 통해 인증서 상태 확인 과정을 진행함으로써 통신 부하를 감소시키고 실시간으로 인증서 상태를 확인 할 수 있는 검증 요청자 신원 정보를 이용한 인증서 상태 확인 메커니즘을 제안한다.

  • PDF